Hi Jeroen,
We got CAIDAs spoofer project, but that primarily afaik checks that by doing connections, not by checking ICMP returns.
I just saw towards 213.244.71.2 : [...] Which means the whole path till that IP was not doing any kind of RPF.... thus spoofing anything else would be possible too.
Maybe I have a wrong imagination on how this spoofing testing is done, but... If you spoof the source address you simply can't get any return. Your traceroute proves, that your packet leaves the network, but it's not proof for, that BCP38 was not implemented. Because IF your packets were forwarded with spoofed source, you won't got any response, not even from the first hop. Obviously, because your false source IP would get the ICMP returns, not your probe. So, IMHO, it's more likely to me your traceroute is proof for a NAT and not for spoofing. Greetings, Max